VIDEO
Cloud and Web App Security
Video Summary:
Criminals are targeting cloud apps and infrastructure, stealing loads of sensitive information and holding companies hostage. How do attackers break in, and what exactly do they do with access when they have it? In this fast-paced talk on cloud and web app security, we’ll show you how hackers: - Hijack API keys and Break into your cloud infrastructure - Exploit common misconfigurations to scrape data and compromise applications = Spread from on-prem to the cloud (and vice versa) - Lurk in your systems to steal data, hijack payments, and more - Hold your cloud data hostage unless you pay a ransom Along the way, we’ll also show you tips and tricks on securing your cloud infrastructure and locking hackers out before they get their hands on your goldmine of data. Looking for just the highlights? Check out our blog on web app and cloud application security: https://www.lmgsecurity.com/how-to-reduce-web-app-and-cloud-application-security-risks/
Criminals are targeting cloud apps and infrastructure, stealing loads of sensitive information and holding companies hostage. How do attackers break in, and what exactly do they do with access when they have it? In this fast-paced talk on cloud and web app security, we’ll show you how hackers: - Hijack API keys and Break into your cloud infrastructure - Exploit common misconfigurations to scrape data and compromise applications = Spread from on-prem to the cloud (and vice versa) - Lurk in your systems to steal data, hijack payments, and more - Hold your cloud data hostage unless you pay a ransom Along the way, we’ll also show you tips and tricks on securing your cloud infrastructure and locking hackers out before they get their hands on your goldmine of data. Looking for just the highlights? Check out our blog on web app and cloud application security: https://www.lmgsecurity.com/how-to-reduce-web-app-and-cloud-application-security-risks/